Signaling Identity Part I: Foundations

advertisement
Signaling Identity
chapter abstracts with representative bibliographic references
as of May 10, 2007
Judith Donath
judith@media.mit.edu
Part I: Foundations
The introduction provides an outline of the book and its purpose. The signaling
chapter is the foundation of the entire book; it explains signaling theory and the key
issues involved in applying it to human behavior. The three final chapters in this
section - on deception, reputation and impression formation - are short introductions
to large concepts that are key to understanding signaling theory and its application.
1. Introduction
Human beings are social creatures. We live in groups, form intense relationships
with each other, and structure our world with organizations ranging in size from
partnerships to nation-states. Today, an increasing amount of this social interaction
is occurring in the domain of mediated communication.
The mediated world is a synthetic space, wholly man-made. Its design determines
what we can see, hear and do within it. It is a mutable space, rapidly evolving as
technology advances and new interfaces are created. It is an increasingly ubiquitous
world, touching every aspect of life. Email and other communication media allow
people to maintain a much larger set of contacts and acquaintances; online forums
make it possible for geographically and culturally distant people who share a
common interest or concern to find each other. People rely on the net for support
and friendship; it is the place to go for finding dates, business connections, and life
partners.
The goal of this book is to help us understand the social dynamics of this ever
changing world, and to help shape the design of future spaces. To do this I use the
framework of signaling theory as developed primarily in the field of theoretical
biology. Most of the things we want to know about each other – one’s identity,
status, and intentions – are qualities that are not directly observable. Instead, we rely
on signals, which are indicators of these hidden qualities, in order to comprehend the
world around us.
We may interpret a big house as a signal of wealth, direct eye contact as a signal of
honesty, a pierced nose and tongue as a signal that someone is not seeking a career in
banking. However, signals are not always reliable. Sometimes the sender
deliberately manipulates them to create a false impression. Signaling theory
provides a framework for understanding why some signals are open to deceptive use
while others are not. Furthermore, in the human world, signals exist within a rich
context of cognitive abilities and cultural meanings. We need to look to this larger
context in order to understand how signals develop and how they are understood (or
not) by those who see them.
Signaling plays an even bigger role in mediated communication, for the online world
is a place built of information, in which nearly everything is a signal. Qualities we
are accustomed to simply observing become, in the mediated world, hidden traits we
assess through observed signals. Height, for example, is directly observable in the
face-to-face world. In mediated spaces, we can infer height only from signals, such
as the claim “I am over 6 feet tall.”
Mediated communication occurs within wholly designed environments. Whether
you can see the face or hear the voice of your conversational partner, whether you
can see a history of other people’s actions, and whether or not some external
evidence anchors their claims of identity are all a function of decisions made by the
system’s designers. These design decisions determine the reliability and
effectiveness of communicative signals and other cues.
Yet today such designs are often made with an incomplete and often naïve
understanding of what people are really trying to convey and interpret. By looking at
communication through the framework of signaling, and by understanding how
signals work – what makes them reliable and how they evolve – we can design better
contexts and interfaces for social interaction.
The introductory chapter outlines the basic ideas of the book. It discusses the
fundamental qualities of the mediated world – that it is synthetic and designed, that it
connects millions of people, and that it is a disembodied world, composed of
information rather than objects, bits rather than atoms. It will explain why the
question of how we perceive and perform identity online is interesting and important
and it will describe how examining these question though the lens of signaling theory
can bring greater clarity to our understanding.
Donath, Judith. (1998). Identity and Deception in the Virtual Community. In (Marc Smith and
Peter Kollock, ed.) Communities in Cyberspace. New York: Routledge.
Donath, Judith. 1998. Identity and deception in the virtual community. In Communities in
Cyberspace., ed. Marc Smith and Peter Kollock. New York: Routledge.
Hauser, Marc. 1996. The Evolution of Communication. Cambridge, MA: MIT Press.
Hollan, J. and S. Stornetta. (1992). Beyond Being There. In Proceedings of SIGCHI
conference on Human factors in computing systems, Monterey, CA, May 1992.
ACM, 119-125.
Sproull, Lee and Sara Kiesler. (1991). Connections: New Ways of Working in the Networked
Organization. Cambridge MA: The MIT Press.
Turkle, Sherry. (1995). Life on the Screen. New York: Touchstone.
Whyte, W. 1988. City. New York: Doubleday.
2. Honest and Dishonest Signaling
This chapter explains signaling theory, which is the theoretical foundation of this
book.
Many of the things we want to know about other people are not directly perceivable.
Are you a nice person? If we had children together, would you be a good parent?
Did you really like the cake I baked? We rely instead on signals, which are
perceivable indicators of these interesting but invisible qualities. A quality can be
almost anything: strength, honesty, genetic robustness, poisonousness, suitability for
bookkeeping employment, etc. We rely on signals when direct evaluation of the
quality is too difficult or dangerous. A bird wants to know if the butterfly it is about
to eat is poisonous before it takes a bite, and relies on the signal of wing markings to
decide whether to eat or move on. An employer wants to determine before making a
hiring decision whether a candidate will be successful or not, and relies on signals
such as a resume, references, and the candidate’s actions and appearance to predict
suitability for the job.
Signaling occurs in competitive environments. The interests of sender and receiver
seldom align exactly and often are quite at odds with each other. Sometimes the
competition is fierce and overt, as with prey and predators. Potential prey may
signal to predators that they are poisonous or that they can run so fast or fight back
so strongly that pursuing them is futile. Sometimes the competition is subtle, as
when the signaling is between seemingly congenial companions. However, even
within cooperative relationships there are conflicts of interest about plans and
identity. I wish to present myself in the best possible light while you want to know
what I am really thinking and what I really can and will do.
In these competitive arenas, being deceptive can be quite beneficial for the signaler.
If a bug presents itself as poisonous when it is not, it may avoid being eaten. If I
present myself as more experienced than I really am, I may get a better job.
However, such deceptions are harmful for the receiver. If the rate of deception
becomes too high, the signal loses its meaning.
Signaling theory explains what makes some signals more reliable than others are. A
reliable signal is one that is beneficial to produce honestly, but too costly when
produced dishonestly. One class of signals that satisfies this requirement is known
as “handicap” signals; these are signals that impose extra costs in the domain of the
resource being signaled. In the animal world, the prototypical example is the
immense antlers that signal the strength in an elk. Carrying such antlers is very
costly in terms of strength: a weaker elk cannot afford to expend so much of its
strength on this display, and thus must display smaller antlers.
The costs that ensure reliability can also be imposed from the outside. Much of
human signaling is “conventional” signaling, where the relationship between signal
and meaning exists by convention, rather than a tightly coupled structural
relationship. Such signals are open to deception, for there is no inherently greater
cost paid by dishonest signalers. However, the receiver or the community at large
can impose costs on dishonest signalers to maintain reliability. Such social
retribution requires knowing the identity of the receiver and a communication
structure for coordinating the response.
Signaling theory has been developed primarily in biology, looking at animal
communication. Applying it to human social interactions requires several
modifications. First, people are adept at finding ways to circumvent the costs of
deceptive signaling, and understanding the dynamics of this arms race is essential.
Second, we are capable of complex social organization and can impose societal costs
on deceptive signalers in ways that are impossible for non-humans; this enables our
extensive use of dynamic, conventional signals. Third, most analyses of animal
signaling have taken for granted that the meaning of the signal was understood by
the receiver. In the world of human signaling, particularly with rapidly changing
conventional signals, the meaning of the signal is often ambiguous. We need
understand how signals acquire their meaning and to account for misinterpretation in
analyzing the signaling process.
This chapter presents signaling theory, drawing from work done in economics,
biology and game theory. It discusses the differences between unintentional cues
and communicative signal, outlines the different types of costs and benefits that
make up the economics of signaling and shows how to apply this theory to
understand phenomena in daily social interactions.
Bacharach, Michael and Diego Gambetti. (2001). Trust in Signs. In Trust in Society, (ed.
Karen Cook):148-184. New York: Russell Sage Foundation.
Bliege Bird, Rebecca and Eric Alden. Smith. 2005. Signaling theory, strategic interaction and
symbolic capital. Current Anthropology 46, no. 2: 221-245
Chandler, Daniel. (2001). Semiotics: The Basics. London: Routledge.
Dawkins, Marian Stamp and Tom Guilford (1991). The corruption of honest signaling. Anim.
Behav 41: 865-873.
Gintis, Herbert, Eric Alden Smith, and Samuel L. Bowles. (2001). Costly Signaling and
Cooperation. Journal of Theoretical Biology 213: 103-119.
Grafen, Alan. (1990a). Biological Signals as Handicaps. Journal of Theoretical Biology 144:
517-546.
Guilford, Tim and Marian Stamp Dawkins. (1993). Receiver Psychology and the Evolution of
Animal Signals. Animal Behaviour 42: 1-14.
Hasson, Oren. (1997). Towards a General Theory of Biological Signaling. Journal of
Theoretical Biology 185: 139-156.
Hauser, Marc. (1996). The Evolution of Communication. Cambridge, MA: MIT Press.
Lachmann, M., Sz. Szamado, and C. T. Bergstrom. (2001). Cost and Conflict in Animal
Signals and Human Language. Proceedings of the National Academy of Sciences
USA. 98: 13189-13194.
Maynard Smith, John and David Harper. (2003). Animal Signals. Oxford, UK: Oxford
University Press.
Mesterton-Gibbons, Mike and Eldridge S. Adams. (1998). Animal Contests as Evolutionary
Games. American Scientist 86: 334.
Spence, Michael. (1973). Job Market Signaling. Quarterly J. of Economics 87: 355-374.
Veblen, Thorstein. 1899. The Theory of the Leisure Class. New York: Macmillan.
Vehrencamp, S.L. (2000). Handicap, Index, and Conventional Signal Elements of Bird Song.
In (Y Espmark, T. Amundsen and G Rosenqvist, ed.) Animal Signals: Signalling
and Signal Design in Animal Communication. Trondheim, Norway: Tapir Academic
Press, pp. 277-300.
Zahavi, Amotz. (1975). Mate Selection - Selection for a Handicap. Journal of Theoretical
Biology 53, no. 1: 205-214.
________. (1977). The Cost of Honesty (Further Remarks on the Handicap Principle). Journal
of Theoretical Biology 67: 603-605.
3. Deception
This is a shorter background chapter about deception.
Keeping signals reliable requires being able to detect and punish deceptions. We
need to understand the underlying cognitive process that goes into creating and
sustaining a lie, for internal conflicts about the lie may cause one inadvertently to
reveal cues indicating one’s deception. This has important design implications for
creating mediated environments, for cues to deception may be obvious in one design
and obscured in another.
Deception is present throughout our everyday life. Society condemns some
deceptions: doing something wrong and lying to avoid punishment is not acceptable,
and neither is maliciously concocting false tales in order to discredit another. Yet
other deceptions are condoned or even required. If I do not like the cookies you have
kindly baked for me, it is still required that I thank you graciously and with seeming
sincerity for the well-intentioned treat. It is important to understand when reliability
is actually the goal: sometimes, we prefer deception. Furthermore, in the social
domain deception is often ambiguous. Where there are rigid class distinctions,
attempting to pass as a member of another class is clearly proscribed as deceptive.
However, in a society such as ours, where social mobility is celebrated, it is unclear
whether cultivating a more desirable accent and dressing in the style of a social class
above the one in which you were born is an example of deception or ambition.
Buller, D. B. and J. K. Burgoon. 1996. Interpersonal Deception Theory. Communication
Theory 6: 203–242.
DePaulo, Bella. M. (2004). 2004. The many faces of lies. In The social psychology of good
and evil, ed. A. G. Miller. New York: Guilford.
Dutton, Denis. (2003). Authenticity in Art. In (Jerrold Levinson, ed.) The Oxford Handbook
of Aesthetics. New York: Oxford University Press.
Ekman, P. (1992). Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage:
New York: W. W. Norton.
Gambetta, Diego. (2004). Deceptive Mimicry in Humans. S. Hurley and N. Chater (Eds.)
Perspective on Imitation: From Mirror Neurons to Memes. Cambridge: MIT Press
Diego Gambetta, University of Oxford.
Hancock, J. T., J. Thom-Santelli, and T. Ritchie 2004. Deception and design: the impact of
communication technology on lying behavior. In SIGCHI Conference on Human
Factors in Computing Systems, Vienna, Austria, ACM Press.
Hauser, M. D. 1992. Costs of deception: Cheaters are punished in rhesus monkeys (macaca
mulatta). PNAS 89, no. 24: 12137-12139.
4. Individual identity and reputation
Identity and reputation play an important role in maintaining the reliability of
signals.
Punishing deceptive signalers can make reliable signals that are otherwise
insufficiently costly to prevent deception. A police officer’s badge is a conventional
signal of authority. The punishment that goes with impersonating a police officer,
rather than the cost of the badge, keeps that signal honest.
Identity is required for such sanctioning: one must be able to connect the misdeed
with a specific individual. More powerful than individual retribution is social
enforcement, which requires the ability to communicate information about another
individual – reputation information - within the community. Reputation allows
many people to benefit from the experience of a few.
The foundations of social sanctioning, and thus of conventional signaling, are
recognition (knowing the identity of another), memory (being able to retain that
knowledge over time), and communication (being able to convey that information to
another). In the animal world, species that do not have these abilities cannot have
reputation based social enforcement. Humans do have them and social sanctioning is
deeply integrated in our everyday communication – it is part of what has allowed us
to develop our rich and dynamic vocabulary of conventional signals.
However, in the online world, we cannot take these abilities for granted. Identity is
problematic: participants may be anonymous or use easily replaced pseudonymous
identifiers. Recognition and memory are impaired in the perceptually sparse world
of online interaction. In the physical world, our experiences provide rich
impressions: we see the others’ faces and clothing, hear their voices, and encounter
each other in richly detailed contexts. Online, such sensory details are often missing:
people may be identified only as cryptic login names or simple and often misleading
pictures. Communication is may also be limited. For example, in some sites, public
postings are the only means of communication.
In the face-to-face world, members of a group often share reputation information
privately among themselves. This type of information sharing, often termed
“gossip”, is an important mechanism for maintaining social groups. It spreads
information about an individual’s actions, thus helping to maintain community mores
and signal reliability. It also motivates people to maintain strong social ties, so that
they will be in the loop for this valuable information, so that they will be in the loop
for this information.
Gossip traditionally works on a small scale, among communities of acquaintances.
The large groups of strangers that are common in the online interactions require a
different process for sharing reputation information. Reputation systems, in which
people describe their experiences with the subject in a public posting, are a common
solution. Anyone in the community, which is often the public, can read these
comments. These public rating sites do not require that the rater have any
relationship with the listeners, and thus they function on a much larger scale than
gossip does among acquaintances. However, this raises issues of reliability: is a
person with no ties to the listeners motivated to provide them with useful
information?
This chapter will look at individual identity and reputation. The first part will
discuss individual identity – which is itself a quality we interpret from signals of
varying reliability, such as names, identity cards, biometric markers or one’s face.
The second part will be about reputation, looking at both at private gossip and at
public reputation systems as means for disseminating it. The chapter will conclude
with an analysis of alternative approaches to large-scale reputation management.
This chapter is important for the thesis of this book because many of the signals in
the mediated world are conventional signals, which depend on reputation to maintain
honesty. Contemporary public reputation systems are often unreliable;
understanding how to make them more trustworthy is an important design challenge.
Boyd, Robert and Peter J. Richerson (1992). Punishment allows the evolution of cooperation
(or anything else) in sizable groups. Ethology and Sociobiology 13: 171-195.
Donath, Judith. (1998). Identity and Deception in the Virtual Community. In (Marc Smith and
Peter Kollock, ed.) Communities in Cyberspace. New York: Routledge.
Dunbar, R. (1996). Gossip, Grooming and the Evolution of Language. Cambridge, MA:
Harvard University Press.
Eder, D. and J. L. Enke. (1991). The Structure of Gossip: Opportunities and Constraints on
Collective Expression among Adolescents. American Sociological Review 56, no. 4:
494-508.
Emler, Nicholas. (2001). Gossiping. In (W. P. Robinson and H. Giles, ed.) The New Handbook
of Language and Social Psychology. New York: Wiley, pp. 317–338.
Friedman, E. J. and P. Resnick. 2001. The social cost of cheap pseudonyms. Journal of
Economics & Management Strategy 10, no. 2: 173-199.
Gluckman, Max. (1963). Gossip and Scandal (Papers in Honor of Melville J. Herskovits).
Current Anthropology 4, no. 3: 307-316.
Kling, Rob, Ya-Ching Lee, Al Teich, and Mark S. Frankel. 1999. Assessing anonymous
communication on the internet: Policy deliberations. The Information Society 15, no.
2: 79 - 90.
Kollock, Peter. (1991). The Production of Trust in Online Markets. In (E. J. Lawler, M. Macy,
S. Thyne and H. A. Walker, ed.) Advances in Group Processes. Greenwich, CT: JAI
Press.
Kreps, David and Robert Wilson. (1982). Reputation and Imperfect Information. Journal of
Economic Theory 27: 253-279.
Lampe, Cliff and Paul Resnick. (2004). Slash(Dot) and Burn: Distributed Moderation in a
Large Online Conversation Space.In Proceedings of ACM Computer Human
Interaction Conference, Vienna, Austria.
Paine, Robert. (1967). What Is Gossip About? An Alternative Hypothesis. Man New series 2,
no. 2: 278-285.
Resnick, Paul, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. (2000). Reputation
Systems. Communications of the ACM 43, no. 12: 45-48.
5. Impression formation
Individual identity is about who specifically you are: it is the identity of ID cards,
fingerprints, and face recognition. Social identity is about what type of person you
are: it is the identity of impressions and prototypes, of the expectations we have of
how others think and will act and of the rules that govern how we act toward each
other. Social identity is fundamental to all social interaction: people want to know
about others’ beliefs, status, affiliations, and intentions in order to interpret their
words and actions and to predict their future behavior.
The signaling examples from the world of biology have been simple mappings, with
a direct correspondence between signal and trait: big horns indicate strength. Our
interpretation of social identity is more complex. We bring to the process a number
of pre-existing prototypes and we form our impressions of each other by identifying
them with one or another of these prototypes. Thus, from a limited set of
interactions and observations we form richly detailed (if not always accurate)
impressions of each other. Understanding how these we create these prototypes,
share them across a culture, and use them to form beliefs about each other is an
essential part of understanding how human social interaction.
Interpretations of identity are subjective. The prototypes that populate one person’s
cognitive map of the social world will be different from another’s, formed by
different experiences. The more people share of a common culture, the more likely
it is that their social prototypes will be similar.
One of the paradoxes of the online world is that it brings together people from vastly
different backgrounds into an environment where identity cues are sparse. The
relative lack of identity cues necessitates relying more on one’s personal prototypes
to infer details about others, while the cultural difference among participants means
that these prototypes, and thus the resulting impressions, are likely to be disparate.
Online identity cues are easily manipulated. A self-presentation is seldom a direct
and “honest” indication of a person’s actual internal state. People manipulate the
signals they give off in order to manage the impression others have of them, to
induce various emotional responses, and because it is required by society. Looking
at impression management through the lens of signaling theory makes us focus on
the constraints that keep these signals meaningful.
Sometimes, we want to assess others’ internal state as well as possible, to “see
through” the ways they have chosen to manage the signals they give off. But not
always. Sometimes we are content with the behavior as it is, disregarding whether it
is a reliable indicator of internal state. The dynamics of identity presentation and
interpretation are complex, and the receivers may be complicit with the signalers in
maintaining deception.
Online identity cues are also often novel, displaying different types of information
than is available in the face-to-face world, or showing it in a very new form. The
online world provides an extraordinary opportunity to see how people adopt and
adapt to new forms of signaling. For example, social network sites display of all
one’s ‘friends” as part of one’s profile, a feature that provides a new modality for
personal expression, manipulation – and for perceptive decoding.
This chapter will introduce these key concepts about identity. It will discuss
prototype formation and the special problems presented by the culturally diverse yet
communicatively sparse online environment. It will explore what “honest” signaling
means in the context of identity management.
Akerlof, George and Rachel Kranton (2000). Economics and Identity. Quarterly Journal of
Economics CVX(3): 715-753.
Aronson, E. (1988). The Social Animal. NY: Freeman.
Cosmides, Leda, John Tooby, and Robert Kurzban (2003). Perceptions of race. Trends in
Cognitive Sciences 7(4).
Goffman, Erving. On Face-Work Interaction Ritual. New York: Doubleday. Original edition,
Psychiatry: Journal of Interpersonal Relations 18:3 (1955), pp. 213-231, pp. 5-46.
________. (1959). The Presentation of Self in Everyday Life. Garden City, New York:
Doubleday Anchor Books.
Golder, Scott and Judith Donath. (2004). Social Role in Electronic Communites.In
Proceedings of Association of Internet Researchers, Bristol, England, Pages.
Gumperz, John Joseph. (1982). Language and Social Identity. Studies in Interactional
Sociolinguistics; 2. Cambridge [Cambridgeshire]; New York: Cambridge University
Press.
Hancock, J. T. and P. J. Dunham. 2001. Impression formation in computer-mediated
communication revisited. Communication Research 28: 325-347.
Hirschfeld, Lawrence A. (1996). Race in the Making: Cognition, Culture, and the Child's
Construction of Human Kinds. Learning, Development, and Conceptual Change.
Cambridge, Mass.; London, England: MIT Press.
Holland, Dorothy and Debra Skinner. (1987). Prestige and Intimacy: The Cultural Models
Behind Americans' Talk About Gender Types. In (D. Holland and N. Quinn, ed.)
Cultural Models in Language and Thought. New York: Cambridge University Press,
pp. 78-111.
Jacobson, David. (1999). Impression Formation in Cyberspace: Online Expectations and
Offline Experiences in Text-Based Virtual Communities. Journal of ComputerMediated Communication 5, no. 1.
Lakoff, George. (1987). Women, Fire, and Dangerous Things: What Categories Reveal About
the Mind. Chicago: University of Chicago Press.
Lamont, Michele. (1992). Money, Morals, and Manners: The Culture of the French and
American Upper-Middle Class. Chicago, IL: University of Chicago Press.
Rosch, Eleanor. (1975). Cognitive Representations of Semantic Categories. Journal of
Experimental Psychology 104: 192-233.
Simmel, Georg. (1959). How Is Society Possible? In (Kurt H. Wolff, ed.) Georg Simmel,
1858-1918: A Collection of Essays. Columbus, OH: Ohio State University Press.
Original edition, 1908.
Tajfel, Henri. (1982). Social Identity and Intergroup Relations. European Studies in Social
Psychology. Cambridge [Cambridgeshire]; New York
Tidwell, Lisa Collins and Joseph B. Walther. (2002). Computer-Mediated Communication
Effects on Disclosure, Impressions, and Interpersonal Evaluations: Getting to Know
One Another One Bit at a Time. Human Communication Research 28, no. 3: 317348.
Walther, J. B. 1997. Group and interpersonal effects in international computer-mediated
collaboration. Human Communication Research 23, no. 3: 342-369.
Part II: Analysis and applications
The second part of the book looks at areas where signaling theory can change how
we think about human communication and how we design for online interaction.
6. Fashion as a signal
The thesis of this chapter is that fashion, often thought of as foolish and frivolous, is
actually a signal of one’s adeptness and adaptability in an information society. It
indicates one’s level of access to new information and willingness to change
continuously. With information becoming the key source of power and influence in
our society, fashion is becoming an increasingly significant signal.
Fashions are signals where the form of the signal changes over time while the
indicated quality, generally one’s affiliation to and status within a particular social
group, remains the same. There are fashions in clothing, music, language and ideas
– indeed, any changeable, information-based expression. Just as displays of strength
indicate one’s prowess in the physical world, and displays of money indicate one’s
prowess in the financial world, displays of fashion indicate one’s prowess in the
information world.
Fashion signals occur in socially mobile cultures, where status is highly contested
and knowledge and social connections are essential. As a widespread cultural
phenomenon, fashion first emerged in Europe in the 14th to 17th centuries, as the rise
of merchant and artisan classes brought new social mobility, and technological and
scientific developments ushered in a world in which change and a belief in progress
replaced the stasis of the medieval world. In the following centuries, information
flow has accelerated, and so has the rate of change in fashion. Whereas 16th century
fashions might change over a period of months or years, today there are fashions that
emerge and sink within the course of a few days.
Fashion signals access to information within a particular social affiliation, one’s
willingness to adapt to new ways of doing things, and one’s commitment to that
affiliation. Keeping up with changing fashions requires knowing which fashion to
follow (thus signaling information access) and spending time, money or other
resources on frequent updates (thus signaling need and commitment).
Within the culture of fashion, there are innovators, leaders and followers: roles that
require different levels of knowledge and resource expenditure. At the top of a
fashion hierarchy one must spend considerable time maintaining the contacts that
provide access to the newest ideas. As a particular signal moves down the hierarchy
and become mainstream, less effort is required to learn about it. The path a fashion
takes as is spreads traces the structure of a society.
In the 16th century, fashion signaled access to information, at the time a rare
resource. Today, information is plentiful, but attention is limited and the ability to
find the right information in a barrage of data is a valuable trait. Material fashion –
fashions embedded in goods such as cars or clothing – cannot keep up with the rate
of change that contemporary information flow make possible. What will be the
future of fashion? How will fast, information-based fashion be integrated with
personal display – and how will fashion become embodied in the virtual world? The
chapter will conclude with an analysis of the design challenges posed by accelerating
fashion.
Abrahamson, Eric. 1996. Management Fashion. The Academy of Management Review 21, no.
1: 254-285.
Adar, Eytan, Li Zhang, Lada A. Adamic, and Rajan M. Lukose. (2004). Implicit Structure and
the Dynamics of Blogspace. In Proceedings of 13th International World Wide Web
Conference: Workshop on the Weblogging Ecosystem.
Bikhchandani, Sushil, David Hirshleifer, and Ivo Welch (1992). A theory of fads, fashion,
custom, and cultural change as informational cascades. Journal of Political
Economy 100(5): 992-1026.
Braudel, Fernand. (1979). The Structures of Everyday Life. Translated by Sian Reynolds. New
York: Harper and Row.
Chiou, Ta-gang and Judith Donath. (Year). Inferring Sub-culture Hierarchies Based on Object
Diffusion on the World Wide Web. In Proceedings of ICDCS International
Workshop of Knowledge Discovery and Data Mining in the World-Wide Web,
Taipei, Taiwan. IEEE.
Crane, Diana (1999). Diffusion Models and Fashion: A Reassessment. The ANNALS of the
American Academy of Political and Social Science 566(13-24).
Freudenberger, Herman. 1963. Fashion, sumptuary laws, and business. The Business History
Review 37, no. 1/2: 37-48.
Huberman, Bernardo A., Christoph Loch, and Ayse Onculer. (2004). Status as a Valued
Resource. Social Psychology Quarterly 67, no. 1: 103-114.
McCracken, Grant. (1988). Culture and Consumption. Bloomington.: Indiana University
Press.
Miller, E. (1975). Status Goods and Luxury Taxes. The American Journal of Economics and
Sociology 34, no. 141-154.
Pesendorfer, Wolfgang. (1995). Design Innovation and and Fashion Cycles. The American
Economic Review: 771-792.
Simmel, Georg. (1904). Fashion. International Quarterly 10, no. 1: 130-155.
Suzuki, Tadashi and Joel Best. (2003). The Emergence of Trendsetters for Fashions and Fads:
Kogaru in 1990s Japan. Sociological Quarterly 44, no. 1: 61-80.
Thornton, Sarah. (1996). Club Cultures: Music, Media and Subcultural Capital. Middletown,
CT: Wesleyan University Press.
Veblen, Thorstein. (1899). The Theory of the Leisure Class. New York: Macmillan.
7. Gifts
Gifts are puzzling. They are puzzling to economists, who have noted that they are
extremely inefficient. Enormous amounts of money are spent buying presents for
people who often do not want or need the item purchased for them. And they are
puzzling to participants in the exchange: an entire industry of etiquette writers and
department store gift advisors exists to help people figure out what is an appropriate
present to buy. Holiday shopping is stressful, as people worry about who to give to,
what to give, how much to spend.
The seeming inefficiency of gifts becomes much more understandable when we look
at them as signals that indicate the sender’s intentions for the relationship and beliefs
about the recipient’s interests. In this case, the inefficiency of the gift is an important
part of its signaling function: it is a potentially costly risk. Indeed, there is a subtle
but important distinction between gifts and other forms of exchange; when the focus
is on the value of the gift or on the expectation of return favors, the gift becomes
barter – or bribe. Gift giving is an example of how an increase in efficiency can
cause a decrease in communication: if you make explicitly known your preference in
gifts, then my giving you the right gift can no longer indicate how insightful I am
about your beliefs and taste.
Gift giving has been proposed as a metaphor for the growing phenomenon of
voluntary participation in collective endeavors. Such endeavors include software
projects, from operating systems to mobile games, large publications, and extensive
support networks. Like gifts, these voluntary efforts are puzzling to classical
economists: why would someone find little joy working 8 hours a day to write
compiler code for pay, then go home and happily code some more for free?
Understanding the motivations driving these contributions is an important challenge,
for an increasing number of significant projects are created as free collaborations.
This chapter will look at gift giving as a form of social signaling, discussing the
distinction between gifts and other forms of exchange, and showing how some
seemingly inefficient costs serve an important communicative function. The second
part of the chapter will examine the role of gifts and gift-like behaviors in the
formation of collaborative endeavors.
Appadurai, Arjun. 1986. Introduction: Commodities and the politics of value. In The social
life of things, ed. Arjun Appadurai. Cambridge, UK: Cambridge University Press.
Bergquist, Magnus and Jan Ljungberg. 2001. The power of gifts: Organizing social
relationships in open source communities. Information Systems Journal 11, no. 4:
305-320.
Camerer, Colin. 1988. Gifts as economic signals and social symbols. The American Journal of
Sociology Organizations and Institutions: Sociological and Economic Approaches
to the Analysis of Social Structure 94, no. Supplement: S180-S214.
Carrier, James. 1991. Gifts, commodities, and social relations: A Maussian view of exchange.
Sociological Forum 6, no. 1: 119-136.
Glazer, Amihai and Kai A. Konrad. 1996. A signaling explanation for charity. The American
Economic Review 86, no. 4: 1019-1028.
Hochschild, Arlie Russell. 1983. The managed heart: Commercialization of human feeling.
Berkeley, CA: University of California Press.
Kollock, Peter. 1998. The economies of online cooperation: Gifts and public goods in
cyberspace. In Communities in cyberspace, ed. Marc Smith and Peter Kollock.
London, UK: Routledge.
LeBas, Natasha R. and Leon R. Hockham. 2005. An invasion of cheats: The evolution of
worthless nuptial gifts. Current Biology 15: 64-67.
Mauss, Marcel. 1990. The gift. Translated by W.D. Halls. New York: W.W. Norton. Original
edition, 1950.
Offer, Avner. 1997. Between the gift and the market: The economy of regard. The Economic
history review 50, no. 3: 450-476.
Osteen, Mark. 2002. Gift or commodity? In 2002 Midwest Modern Language Association
Panels. Minneapolis, MN.
Prendergast, Canice and Lars Stole. 2001. The non-monetary nature of gifts. European
Economic Review 45, no. 10: 1793-1810.
Smart, Alan. 1993. Gifts, bribes, and guanxi: A reconsideration of bourdieu's social capital.
Cultural Anthropology 8, no. 3: 388-408.
Waldfogel, Joel. 1993. The deadweight loss of christmas. American Economic Review 83, no.
5: 1328-36.
________. 2002. Gifts, cash, and stigma. Economic Inquiry 40, no. 3: 415-427.
Zelizer, Viviana A. 1996. Payments and social ties. Sociological Forum 11, no. 3: 481-495.
________. 1997. The social meaning of money. Princeton, New Jersey: Princeton University
Press.
8. Social networks
Social networks are the interlocking ties of relationships that form the structure of a
society. The advent of the mediated world has changed these networks in several
significant ways. First, it has made them bigger. Historically, a village resident
might have had 100 contacts over the course of a lifetime; today’s active online
participant may be in communication with several hundred people and have an
accumulation of thousands of contacts. Second, it has made them global. In the past,
social networks had consisted primarily of local ties; today they are worldwide
networks in which similarity of interests, rather than geography, defines proximity.
Most recently, it has begun changing how they a formed. A number of software
programs and web sites build large-scale renderings of social networks by inviting
people to list all their friends and connections. These people in turn list all their
friends and connections, creating a partial, yet extensive social network map. The
goal of such sites is not only to depict the network, but also to assist people in
making new connections through their existing ties.
This chapter will start with a description of the structure and formation dynamics of
social networks. The focus will be on signaling information about social networks –
how people indicate to others who their connections are and why they would do this.
The chapter will then look at how communication technology is changing social
networks and discuss the changes this makes in what information people want to
know about each other and the signals they use to indicate it.
Current social networking sites are still primitive. Their notion of ties is uniform –
they make little distinction between the ties connecting close friends and vague
acquaintances. Nor is there any recognition of the faceted nature of social life.
People associate with different groups, consonant with different facets of their lives:
they may not wish to make those connections known to each other. The final
section of the chapter will discuss new designs for social networking.
Barabasi, Albert-Laszlo, Hawoong Jeong, Zoltan Neda, Erzsebet Ravasz, Andras Schubert,
and Tamas Vicsek (2002). Evolution of the social network of scientific
collaborations. American Physical Society Meeting Abstracts: 27012.
Burt, Ronald S. (2002). The Social Capital of Structural Holes. In New Directions in
Economic Sociology, (ed. Mauro F. Guillén, Randall Collins, Paula England and
Marshall Meyer). New York: Russell Sage Foundation.
Donath, Judith and danah boyd. (2004). Public Displays of Connection. BT Technology
Journal. 22, no. 4: 71-82.
Feld, S.L. (1981). The Focused Organization of Social Ties. American Journal of Sociology
86: 1015-1035, no. No. 5: 1015-1035.
Fono, David and Katie Raynes-Goldie. In press. Hyperfriends and beyond: Friendship and
social norms on livejournal. In Selected papers from the association of internet
researchers conference., ed. M. Consalvo and C. Haythornthwaite, 4. New York:
Peter Lang.
Freeman, Linton. (2000). Visualizing Social Networks. Journal of Social Structure 1: 1.
Freeman, Linton C. (1992). Filling in the Blanks: A Theory of Cognitive Categories and the
Structure of Social Affiliation. Theoretical Advances in Social Psychology Social
Psychology Quarterly 55, no. Special Issue 2: 118-127.
Girvan, M. and M.E.J. Newman. (2002). Community Structure in Social and Biological
Networks. Proceedings of the National Academy of Sciences USA. 99, no. 12: 78217826.
Granovetter, Mark S. (1973). The Strength of Weak Ties. American Journal of Sociology 78:
1360-1380.
________. (1983). The Strength of Weak Ties Revisited. Sociological Theory 1: 201-233.
Hill, R. A. and R. I M. Dunbar. (2003). Social Network Size in Humans. Human Nature 14:
53-72.
Krebs, Valdis. Data Mining Email to Discover Social Networks and Communities of Practice.
Accessed. Available from http://www.orgnet.com/email.html.
McGregor, P. K. and T. M. Peake. (2000). Communication Networks: Social Environments
for Receiving and Signalling Behaviour. Acta ethologica 2, no. 2: 71 - 81.
Milgram, Stanley. (1967). The Small-World Problem. Psychology Today: 62-67.
Wellman, B. and M. Gulia. (1999). The Network Basis of Social Support: A Network Is More
Than the Sum of Its TiesNetworks in the Global Village: Boulder, CO: Westview
Press, pp. 83-118.
9. Real and virtual faces
The face is essential in real world social interactions: we read character and
expression in the face, we recognize people by their face, and the face indicates
where one’s attention lies. Yet the face is absent from many online interactions – and
this is in part why many people find cyberspace to be only a pale substitute for real
world contact.
There are numerous approaches for incorporating facial representations into online
interactions. These range from the simple and now ubiquitous smiley to animated
avatars to real-time video, all differing significantly from the experience of face-toface, immediate interaction. Sometimes this difference makes a visual interface less
useful or appealing than a textual one; in other circumstances, it can be preferable
even to face-to-face discourse. Most notably, we can design the mediated face to
selectively present information: it can convey expressions but not identity, or vice
versa. Controlling the information a face conveys is a very complex challenge, for
we read meaning in the subtlest of expressions.
Signaling theory is central to this chapter because the face’s structure, decorations,
and expressions all function as signals that we interpret as representing underlying
qualities of character, affiliation, and emotional state. How reliable these signals are,
whether they are innate or culturally dependent, and what is the real nature of the
underlying qualities are all controversial topics. I will present arguments from
research in cognitive science and related disciplines.
This chapter is central to the book’s thesis. It starts with an in-depth discussion of
the face as signal, and then uses that as the basis for analyzing online facial
representations and for designing future implementations. It is the main example of
how to apply the insight gained from signaling based analysis to new media design.
Argyle, M. and M Cook. (1976). Gaze and Mutual Gaze. Cambridge: Cambridge University
Press.
Bailenson, Jeremy N. and Nick Yee. 2005. Digital chameleons. Psychological Science 16, no.
10: 814.
Brilliant, R. (1990). Portraiture. Cambridge, MA: Harvard University Press.
Bruce, V. and A Young. (1998). In the eye of the beholder. The science of face perception:
Oxford University Press, Oxford UK.
Cassell, J. and H. Vilhjálmsson. (1999). Fully embodied conversational avatars: Making
communicative behaviors autonomous. In Autonomous Agents and Multi-Agent
Systems 2, no. 1: 45-64.
Darwin, C. (1998). The Expression of the Emotions in Man and Animals. Oxford,UK: Oxford
University Press. Original edition, 1872.
Donath, J. (1994). The Illustrated Conversation. Multimedia Tools and Applications 1: 79-88.
Donath, Judith.(2001). Mediated Faces.In Cognitive Technology: Instruments of Mind.
Proceedings of the 4th International Conference, Warwick, UK, August 6-9.(M.
Beynon, C.L. Nehaniv and K. Dautenhahn, Ed.) 373-390.
Ekman, Paul. (1999). Facial Expression. In (T. Dalgleish and M Power, ed.) The Handbook of
Cognition and Emotion. New York: John Wiley & Sons, Ltd, pp. 301-320.
Fridlund, A.J. (1997). The New Ethology of Human Facial Expression. Edited by The
Psychology of Facial Expression. Russell, J.A, Fernández-Dols, J. M. (Eds.):
University of Cambridge Press, Cambridge, UK.
Frijda, N.H. and A. Tcherkassof. (1997). Facial Expressions as Modes of Action Readiness.
Russell, J.A, Fernández-Dols, J. M. (Eds.): The Psychology of Facial Expression.
Cambridge: University of Cambridge Press, Cambridge, UK.
Isaacs, E and J. Tang. (1994). What Video Can and Can't Do for Collaboration. In Multimedia
Systems, 2:63-73.
Kurlander, D., T. Skelly, and D. Salesin. (1996). Comic Chat. In Proceedings of Proceedings
of SIGGRAPH '96.
Mueller, U and A Mazur. (1997). Facial Dominance in Homo Sapiens as Honest Signaling of
Male Quality. Behavioral Ecology 8: 569-579.
Paulos, E. and J. Canny. (1998). Designing Personal Tele-Embodiment. IEEE International
Conference on Robotics and Automation.
Pelachaud, C., Badler N, and Steedman M. (1994). Generating Facial Expressions for Speech.
Cognitive Science 20, no. 1: 1-46.
Perlin, K. (1997). Layered Compositing of Facial Expresson. Technical Sketch SIGGRAPH.
Russell, J. A. and J. M. Fernández-Dols. (1997). What Does a Facial Expression Mean? In
(J.A. Russell and J. M. Fernández-Dols, ed.) The Psychology of Facial Expression.
Cambridge, UK: University of Cambridge Press.
Sproull, L., R. Subramani, J. Walker, S. Kiesler, and K. Waters. (1996). When the Interface Is
a Face. Human Computer Interaction 11: 97-124.
Zebrowitz, L. (1997). Reading Faces: Westview Press, Boulder, CO.
10. Epilogue: The Not Quite Human Other
This chapter is about our relationship with the not-quite-human other: software
agents, robots, highly augmented humans. It is the most philosophical chapter of the
book, having at its core questions about our knowledge of other minds, the nature of
empathy, and the extent to which we really want to know each other.
Throughout history, people have attempted to synthesize life. Ranging from the
animatronics of Vaucanson to the dark myths of the Golem and Frankenstein,
attempts to play the role of ultimate creator have elicited fascination and horror.
With the advent of computers, this quest and the concerns surrounding it have
achieved a new urgency, for these mechanical brains, while looking nothing like a
living creature, arguably have the potential to produce thought and language, that
which is most uniquely human.
In 1950, Alan Turing published the essay “Computing Machinery and Intelligence”
in which he reframed the question “can machines think?” as “can we know if a
machine is thinking?” He used the metaphor of the Imitation Game, now popularly
known as the Turing Test, to show that it was conceivable that a machine would be
undetectable able to imitate human interaction without necessarily thinking like a
human.
In the early 1960’s, Joseph Weizenbaum created Eliza, a computer program modeled
on a Rogerian psychoanalyst that used simple linguistic parsing to sustain its side of
a conversation. His goal was to show that even an obviously non-intelligent
machine could converse, and thus conversation was a poor arena for judging
intelligence; instead, people reacted enthusiastically to the computational partner,
even proposing it as a replacement for human psychologists. Weizenbaum, deeply
disturbed by this reaction, retired from the field of computer science and wrote about
the dangers of becoming reliant on the machine made decisions, decisions that would
be made without human compassion or wisdom.
Today, conversational agents are becoming common participants in mediated
interactions. The issues raised by Turing – can we distinguish between machine and
human in a mediated interaction – are essentially signaling questions. What are the
signals that indicate that one is human? Conscious? Intelligent? How do we define
these underlying qualities – and are they the ones we are trying to assess? In some
contexts, we want to know if the other is truly empathic – and in others, all we really
want to know is if they have access to an accurate train schedule.
This chapter will examine the problem of our perception of machines that seem
human through the lens of signaling theory. It will start with a close analysis of
Turing’s paper and Weizenbaum’s Eliza project. The signaling approach will
highlight the importance of context – that depending on the qualities one really
wishes to uncover, the relationship between signal and quality, including the costs of
the signal and its reliability, differ markedly. The analysis will extend from software
agents in the mediated world to robots and augmented humans in the immediate
world. The chapter will conclude with a discussion of the implications of these ideas
in terms of our understanding of human relationships and the importance of identity
and empathy.
Breazeal, Cynthia. 2003. Toward sociable robots. Robotics and Autonomous Systems 42, no.
3-4: 167.
Donath, J. 2006. The imperfect observer: Mind, machines and materialism in the 21st century.
Gulbenkian Foundation.
Donath, Judith. (2004). Artificial Pets: Simple Behaviors Elicit Complex Attachments. In
(Marc Bekoff, ed.) The Encyclopedia of Animal Behavior: Greenwood Press.
Donath, Judith. (2000). Being Real. In (Ken Goldberg, ed.) The Robot in the Garden:
Telerobotics and Telepistemology in the Age of the Internet. Cambridge, MA: MIT
Press.
Foner, Lenny. 1997. Entertaining Agents: A Sociological Case Study. In Proceedings of the
First International Conference on Autonomous Agents. Marina del Rey, CA.
Harnad, S. (1991) Other bodies, Other minds: A machine incarnation of an old philosophical
problem . Minds and Machines 1: 43-54.
Hauser, Marc D., Noam Chomsky, and W. Tecumseh Fitch. 2002. The faculty of language:
What is it, who has it, and how did it evolve? Science 298, no. 5598: 1569 - 1579.
Mauldin, M. 1994. Chatterbots, Tinymuds, and the Turing Test: Entering the Loebner Prize
Competition. Proceedings of AAAI-94. August 1-4, 1994. Seattle, WA.
Nass, C., J. Steuer, and E.Tauber. (1994). Computers Are Social Actors. Proceedings for Chi
'94: 72-78.
Paulos, E. and J. Canny. (1998). Designing Personal Tele-Embodiment. IEEE International
Conference on Robotics and Automation.
Reeves, Byron and Clifford. Nass. (1996). The Media Equation: How People Treat
Computers, Television, and New Media Like Real People and Places. New York:
Cambridge University Press/CSLI.
Shieber, Stuart, ed. 2004. The Turing Test: Verbal Behavior as the Hallmakr of Intelligence.
Cambridge, MA: MIT Press.
Sproull, L., R. SubramaniJ., J. Walker, S. Kiesler, and K. Waters. (1996). When the Interface
Is a Face. Human Computer Interaction 11: 97-124.
Turing, Alan. (1950). Computing Machinery and Intelligence. Mind 49: 433-460.
Vilhjálmsson, H. H. and J. Cassell. (1998). Bodychat: Autonomous Communicative Behaviors
in Avatars. Proceedings of ACM Second International Conference on Autonomous
Agents: 269-276.
Wada, K., T. Shibata, T. Saito, K. Sakamoto, and K. Tanie. 2005. Psychological and social
effects of one year robot assisted activity on elderly people at a health service
facility for the aged. In Proceedings of the 2005 IEEE International Conference on
Robotics and Automation:2785- 2790.
Weizenbaum, J. (1976). Computer Power and Human Reason. San Francisco, CA: W.H.
Freeman.
Download